Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Android Flaw Lets Apps Steal 2FA Codes

October 15, 2025
Reading Time: 3 mins read
in Alerts
Android Flaw Lets Apps Steal 2FA Codes

Pixnapping is a new type of side-channel attack that targets Android devices. It’s a “pixel-stealing” framework that can covertly siphon data from both browser and non-browser apps, like Google Authenticator. The attack works by taking advantage of a hardware side-channel present in integrated GPUs and a combination of Android APIs. It’s so fast that it can steal a two-factor authentication (2FA) code in under 30 seconds. The researchers behind the discovery named the attack Pixnapping.

At its core, the Pixnapping attack weaponizes a GPU compression feature called GPU.zip, which was previously identified as a vulnerability for browser-based attacks. The researchers found that they could combine this with Android’s window blur API to leak rendering data from other apps. A malicious app, even one without special permissions, sends the pixels of a target app (containing sensitive data like a 2FA code) into the Android rendering pipeline. It then overlays semi-transparent activities to analyze and transmit the pixels, repeating this process for each pixel to steal the full image.

According to the researchers, Android is vulnerable to this attack due to three key factors. First, an app can use Android intents to send another app’s activities to the rendering pipeline. Second, a malicious app can use graphical operations like the blur function on the pixels of another app. Finally, the attack measures the color-dependent side effects of these graphical operations to determine the content of the pixels. This specific combination allows for the attack to occur.

Google has issued a patch for the vulnerability (identified as CVE-2025-48561) in its September 2025 Android Security Bulletin. The initial patch, however, only partially mitigated the issue, as researchers found a way to re-enable the attack by altering its timing. As a result, Google is preparing a second, more comprehensive patch to fully address the new attack vector in an upcoming security update. Google has stated that it has not seen any evidence of this exploit being used in the wild.

In addition to stealing sensitive data, the study also revealed that this attack can be used to bypass a security feature implemented in Android 11. Specifically, it can be used to determine if an arbitrary app is installed on the user’s device, which Android 11 and later versions are designed to prevent. This particular finding remains unpatched, with Google having marked it as “won’t fix.” The researchers suggest that a realistic solution for this type of vulnerability would be to allow sensitive apps to opt out of this behavior and to restrict the capabilities of a potential attacker.

Reference:

  • New Pixnapping Bug Allows Rogue Android Apps To Grab 2fa Codes Without Permission
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Tsundere Botnet Grows via Game Lures

November 21, 2025
APT24 Uses BADAUDIO in Taiwan Spying

APT24 Uses BADAUDIO in Taiwan Spying

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial